A simple Hydra SSH example Here is a simple example of running a Hydra attack against an SSH server. hydra 192.168.1.26 ssh2 -s 22 -P pass.txt -L users.txt -e ns -t 10 This will attack the system 192.1.68.1.26, on port 22 with the SSH protocol, 10 threads at a time, and try all the combinations of usernames and passwords supplied in the files user.txt and pass.txt (+ empty passwords and passwords the same as the username) Web-based login forms prerequisites You need to know: The hostname/IP and URL Whether it is a HTTPS or HTTP service Whether the form supports GET or POST (or both) The parameters of the request The difference in response between success and failure Whether any session cookies are required to be set or maintained What lockout features and thresholds are enabled (if any) For the parameters of the request, you can intercept and examine a normal login attempt with a web proxy (such as owasp-zap, webscarab or burpsuite) or use a browser plugin (such as tamperdata) or just look at the HTML form. An example attack http://192.168.1.69/w3af/bruteforce/form_login/ The important parts of the HTML form are: